General

  • Target

    0fbbd6a8a66e603aeb7559c35cc4a4ef6bd16868f87e11aebd01cfe3d7e8c72f

  • Size

    1.3MB

  • MD5

    1bb6668a304234ea8ca80147a4840ab2

  • SHA1

    885705ecef5bce36dbcd31859fd930a425db461b

  • SHA256

    0fbbd6a8a66e603aeb7559c35cc4a4ef6bd16868f87e11aebd01cfe3d7e8c72f

  • SHA512

    dc2aa91c32d7c1df45df5b9298a37251635f887e00c0c643bd3106e12d4a83cb63960c71297405bc719c28a1fbb52389009841c1d0704c69e4c4c12aade91db5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 0fbbd6a8a66e603aeb7559c35cc4a4ef6bd16868f87e11aebd01cfe3d7e8c72f
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections